Results 101 to 110 of about 482,276 (284)
Operator algebras of functions
33 ...
Mittal, Meghna, Paulsen, Vern I.
openaire +2 more sources
SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley +1 more source
Bayer noise quasisymmetric functions and some combinatorial algebraic structures [PDF]
Recently, quasisymmetric functions have been widely studied due to their big connection to enumerative combinatorics, combinatorial Hopf algebra and number theory.
Adnan Abdulwahid
doaj +1 more source
ABSTRACT In this study, the actual route of methylene blue (MB) dye adsorption by using fabricated polyfunctional activated carbon–copper oxide nanowires (AC@CuO‐NWs) from bulky wastewater bodies has been investigated. To better understand the exact pathway of the adsorption process, a prominent statistical physics formalism or grand canonical ...
Abdellatif Sakly +7 more
wiley +1 more source
ABSTRACT Efficient thermal management in advanced industrial systems requires improved heat transfer performance, particularly under non‐Newtonian fluid behavior and complex surface geometries. This study investigates the two‐dimensional flow and heat transfer characteristics of ternary hybrid nanofluids over both stationary and moving wedge surfaces ...
A. O. Akindele +4 more
wiley +1 more source
Some Uncomplemented Function Algebras [PDF]
1. Let X be the unit circle Iz I = 1, and A the "disc algebra" of functions on X having continuous extensions to I z ? < 1 analytic for I z I < 1. Then it is known [12] that there is no bounded projection of C(X) onto A; alternatively, A is uncomplemented in C(X). To what extent is this a general occurrence?
openaire +2 more sources
Abstract Large swarms often adopt a hierarchical network structure that incorporates information aggregation. Although this approach offers significant advantages in terms of communication efficiency and computational complexity, it can also lead to degradation due to information constraints.
Kento Fujita, Daisuke Tsubakino
wiley +1 more source
Construction and analysis of one class of cryptographic functions
A novel class of n+t -variable Boolean functions G (x,y) through adding t variables while concatenating t+ 1 Boolean functions (called basic function) was constructed and the Walsh spectrum and autocorrelation coefficient of G(x,y)were given.The ...
Zhi-hui OU, Ya-qun ZHAO, Xu LI
doaj +2 more sources
A Few Conditions for a C*-Algebra to Be Commutative
We present a few characterizations of the commutativity of C*-algebras in terms of particular algebraic properties of power functions, the logarithmic and exponential functions, and the sine and cosine functions.
Lajos Molnár
doaj +1 more source
Risk‐aware safe reinforcement learning for control of stochastic linear systems
Abstract This paper presents a risk‐aware safe reinforcement learning (RL) control design for stochastic discrete‐time linear systems. Rather than using a safety certifier to myopically intervene with the RL controller, a risk‐informed safe controller is also learned besides the RL controller, and the RL and safe controllers are combined together ...
Babak Esmaeili +2 more
wiley +1 more source

